Hui, 2015 - Google Patents
Modern identity protection: A multifaceted response to a surreptitious threatHui, 2015
View PDF- Document ID
- 6157454097808735260
- Author
- Hui S
- Publication year
- Publication venue
- Sing. L. Rev.
External Links
Snippet
Technology and the Internet are driving huge informational flows. Fears of identity theft are growing, and this article seeks to unpack the corresponding safeguards. It examines how identity theft seizes control of personal information and uses it to impersonate another. It …
- 230000004044 response 0 title description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Frank et al. | Approach to cyber security issues in Nigeria: challenges and solution | |
Chawki | Nigeria tackles advance fee fraud | |
Smith | Identity theft and fraud | |
Makeri | Cyber security issues in Nigeria and challenges | |
Cassim | Protecting personal information in the era of identity theft: Just how safe is our personal information from identity thieves? | |
Cross | Online fraud | |
Brodeur et al. | Surveillance fiction or higher policing | |
Erbschloe | Social engineering: Hacking systems, nations, and societies | |
Chigada | Towards an aligned South African national cybersecurity policy framework | |
Chawki et al. | 419 scam: an evaluation of cybercrime and criminal code in Nigeria | |
O’Kenny | A Stroke of the Keyboard and Click of the Mouse: an anatomy of cyber frauds as a growing component of illicit financial flows | |
Valetk | Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies | |
Antoniou et al. | Laundering sexual deviance: targeting online pornography through anti-money laundering | |
Ojedokun | The evolving sophistication of Internet abuses in Africa | |
Bello | Anatomy of cybercrime in Nigeria: The legal chronicle | |
Biswas | Data and information theft in e-commerce, jurisdictional challenges, related issues and response of Indian laws | |
Oluyemisi et al. | The Effect of Cyber-Crimes on Depositors Funds in Deposit Money Banks in Nigeria | |
Pontell | 'Pleased to Meet You Won't You Guess My Name?': Identity Fraud, Cyber-crime and White-collar Delinquency | |
Hui | Modern identity protection: A multifaceted response to a surreptitious threat | |
Maghfirah et al. | Cyber crime and privacy right violation cases of online loans in indonesia | |
Sibe et al. | Research Findings—Cybercrime Composition, Frequency, and Complexity in Nigeria (From a Law Enforcement Perspective) | |
Harvin | THREATS IN CYBERSPACE | |
Adenusi et al. | Challenges and way out of cyber security issues in Nigeria | |
Bailey et al. | Examining the Online Anonymity Debate: How Far Should the Law Go in Mandating User Identification? | |
Calcara et al. | Cybercrime, law and technology in Finland and beyond |